Ginp mobile Trojan fakes incoming SMS messages
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
3875 articles
In the hunt for your bank card info, the malware overlays apps with phishing pages and uses fake notifications to get you to open the apps.
We tell you which security and privacy settings will hold Twitter hackers and spammers at bay.
Considering buying a smartphone for your kid? Here are the pros and cons, and how to choose a device.
Researchers presented a study on the reliability of modern vehicle immobilization systems at the Chaos Communication Congress.
Phishers are using the Wuhan coronavirus as bait, trying to hook e-mail credentials.
Ransomware makers seem to be following a new trend, publishing data from companies that refuse to pay them.
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
We reveal the best settings for protecting your profile from hackers, haters, and spammers.
End of support for Windows 7 is cause to analyze your information infrastructure carefully and identify weak spots.
If you get worried when your child hangs out with friends for too long or fear they might be skipping classes, use Kaspersky Safe Kids.
Do your children spend all their time on their computer or smartphone? Kaspersky Safe Kids can help.
Using simple tools such as lasers and music to trick voice assistants and motion sensors.
We present the greenest and safest wallpaper choices for all of your devices, plus the highly anticipated 2020 calendar.
Web threats are actively used in targeted attacks, so their neutralization should be an integral part of APT defense strategy.
Setting up your child’s first smartphone right will help keep them safe — and save you money.
Privacy International talks about period-tracking apps and the perils of sharing secrets with apps.
As we raise kids in the digital age, the rules are constantly changing. Parents need to find the new best practices to rear kids with our connected lives.
Four steps to reduce your company’s IT carbon footprint — and save money.
Under the pretext of compensation for data leaks, fraudsters are selling “temporary U.S. social security numbers.”
Researchers try to modify the contents of a signed PDF file without invalidating the signature.